Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2024, 12:09

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    9127be998e556e17363396d1526611b4

  • SHA1

    1183f9970e1774d3e157d70225c3b7f3c92d9699

  • SHA256

    b852e881c1897d85e3ba7b89065c7ed027bcd775ec34e465b870fd5b2640b1ec

  • SHA512

    20c571bfdcb0a0b844a2266e7cdcbc5b3e13b319ad22c8ef5cf9c4930c2caac6dd12cb027324d75161d2af90b88da3b4dc09eb13a1ec2392e343df0f7ac8fd4a

  • SSDEEP

    24576:xLJoznnpt2joFJa/TDaJ9wI5yo62W4DmDPLoaRbuDTWzmZMSiEzhV4vk3NVPbY8X:xLJwnnpAjcwpoIPsaR4TWoZdd9bs

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 24 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe
        "C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4512
        • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe
          "C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4784
          • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe
            "C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe" restart
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:6056
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c ver
              6⤵
              • System Location Discovery: System Language Discovery
              PID:6080
      • C:\Users\Admin\AppData\Local\Temp\1010242001\e0d67ba1a8.exe
        "C:\Users\Admin\AppData\Local\Temp\1010242001\e0d67ba1a8.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1292
      • C:\Users\Admin\AppData\Local\Temp\1010243001\9139a13e73.exe
        "C:\Users\Admin\AppData\Local\Temp\1010243001\9139a13e73.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 1400
          4⤵
          • Program crash
          PID:2856
      • C:\Users\Admin\AppData\Local\Temp\1010244001\6cef4e3b54.exe
        "C:\Users\Admin\AppData\Local\Temp\1010244001\6cef4e3b54.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:972
      • C:\Users\Admin\AppData\Local\Temp\1010245001\9464fff3b4.exe
        "C:\Users\Admin\AppData\Local\Temp\1010245001\9464fff3b4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4780
      • C:\Users\Admin\AppData\Local\Temp\1010246001\5a589d757b.exe
        "C:\Users\Admin\AppData\Local\Temp\1010246001\5a589d757b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2224
      • C:\Users\Admin\AppData\Local\Temp\1010247001\a25acc169a.exe
        "C:\Users\Admin\AppData\Local\Temp\1010247001\a25acc169a.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3180
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4900
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1788
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:400
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1160
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3204
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3416
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {14dab220-1d3a-4bf4-8633-09580ba4d768} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" gpu
              6⤵
                PID:1272
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c27226d-096e-4328-8d26-84fe1e6e85fd} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" socket
                6⤵
                  PID:4876
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3320 -childID 1 -isForBrowser -prefsHandle 3312 -prefMapHandle 3304 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af007a2c-45d1-4b10-816f-3c588863f5fb} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab
                  6⤵
                    PID:4500
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -childID 2 -isForBrowser -prefsHandle 3268 -prefMapHandle 3832 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b198e5a1-e0e3-444f-8721-e31acc0be7ec} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab
                    6⤵
                      PID:2668
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4564 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4604 -prefMapHandle 4596 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6c0a5d6-ad9b-4331-963d-a04c102ff5f5} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" utility
                      6⤵
                      • Checks processor information in registry
                      PID:5336
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 3 -isForBrowser -prefsHandle 5560 -prefMapHandle 5572 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {23df0b66-9a8e-47cb-b97c-0224928e607d} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab
                      6⤵
                        PID:4064
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5608 -prefMapHandle 5564 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ede73216-81b9-40e5-9fc0-f9271248af56} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab
                        6⤵
                          PID:3020
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 5 -isForBrowser -prefsHandle 5816 -prefMapHandle 5560 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1104 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50d8a855-8302-4525-9629-323c7923348d} 3416 "\\.\pipe\gecko-crash-server-pipe.3416" tab
                          6⤵
                            PID:952
                    • C:\Users\Admin\AppData\Local\Temp\1010248001\795613f5ee.exe
                      "C:\Users\Admin\AppData\Local\Temp\1010248001\795613f5ee.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1656
                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3848
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4644 -ip 4644
                  1⤵
                    PID:3144
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2136

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P2UT3MS5\download[1].htm

                    Filesize

                    1B

                    MD5

                    cfcd208495d565ef66e7dff9f98764da

                    SHA1

                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                    SHA256

                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                    SHA512

                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json

                    Filesize

                    19KB

                    MD5

                    557c845b4fc184f1465e42ea71a49044

                    SHA1

                    5845871649beba8466b42aef70e96988bf16e51b

                    SHA256

                    0eb5155e264127b4f8437dabfe7f7d0200e32738a1196ce4a6e375e979ec0070

                    SHA512

                    ea1ae9611ed001ebde7ed753f8a959019e17f213eabdce850cd0234dc10808ea4075aaa4e2cc5f888866bc83971fde7251fdb5b8dd61fc3f042b4eff82480783

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                    Filesize

                    13KB

                    MD5

                    359c2ff052fc018e867dcfa082f25be4

                    SHA1

                    d5d48dbf4aa09954162d6260d6ad0c5c24ad7ef3

                    SHA256

                    efd35bf73b55891e2dd192772251a9dcb750da9a05760a60abad27dd83c7bb72

                    SHA512

                    495d117a0e63b221d1b796e99252f84364429ac83ecda02396e92b301234ad4cd7f90ea2a5b1d298a764a39f34cf063a8ace4c09cf9a90fde6f25459d03a9790

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\COMDLG32.OCX

                    Filesize

                    149KB

                    MD5

                    ab412429f1e5fb9708a8cdea07479099

                    SHA1

                    eb49323be4384a0e7e36053f186b305636e82887

                    SHA256

                    e32d8bbe8e6985726742b496520fa47827f3b428648fa1bc34ecffdd9bdac240

                    SHA512

                    f3348dbc3b05d14482250d7c399c00533598973f8e9168b4082ee5cbb81089dfaefcfda5a6a3c9f05b4445d655051b7a5170c57ee32d7a783dc35a75fee41aa9

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\MSCOMCT2.OCX

                    Filesize

                    643KB

                    MD5

                    27ec2b0aebea97aa3f343dea1501ec3a

                    SHA1

                    c44b40baa25f257d874fee1c7b4ef9137f2ced51

                    SHA256

                    589e26a16d9171ce22b9a5eb95064cc96c866b1f08ab634d714231b35c2812a8

                    SHA512

                    25ac2951cb890a7747fab37ac1997e842800e71325c510122599dade0cf5bbb2cc490d87596bf8f5e9a16adc40ce1f2e19ffb0a5671597af6cb9e07ec7df9b96

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\MSCOMCTL.OCX

                    Filesize

                    1.0MB

                    MD5

                    273676426739b02a45a0fc9349500b65

                    SHA1

                    a23c709fae04feef87358abd59504940d0d0c806

                    SHA256

                    152121a5d1ac8f12002c18afc294bb1ebcecc1d61deec6211df586c11acde9b6

                    SHA512

                    8945d8a68c4ebb5845fb7f6abf3b4947eb6c37812c32d4ff2f30a0472489496c4506b3be358bb350df5c3d3be11c43c19ba6d3ca72449a7122bcec73cee181d2

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\MSINET.OCX

                    Filesize

                    129KB

                    MD5

                    90a39346e9b67f132ef133725c487ff6

                    SHA1

                    9cd22933f628465c863bed7895d99395acaa5d2a

                    SHA256

                    e55627932120be87c7950383a75a5712b0ff2c00b8d18169195ad35bc2502fc2

                    SHA512

                    0337817b9194a10b946d7381a84a2aeefd21445986afef1b9ae5a52921e598cdb0d1a576bdf8391f1ebf8be74950883a6f50ad1f61ff08678782c6b05a18adbf

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\Model++Xs.dll

                    Filesize

                    6.0MB

                    MD5

                    905a19d6f5e9856ebf1ebae8566f840e

                    SHA1

                    fe2fc3cf3af1a5b5de76793c64a32fdf95d7fb3a

                    SHA256

                    d8e8ec0f6c15c1165acefd3a2b88c9bafed45e777c71d24270d672111c2b822e

                    SHA512

                    bfbde612ce50082b66e23a080d436c7676c78200b4f5ecd61a68db9a56f6a3dbe8390789e2a45469e153fb449e09a17ea364dd19f8910e71634b7efa38928120

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.dll

                    Filesize

                    5.9MB

                    MD5

                    010908233328c294e5e5877e07285478

                    SHA1

                    18a560584c682b2dc21a1228228192c4baf47f6d

                    SHA256

                    a902df81dce5a9b84929c88a5d219df0a5a07206b0801a7a723c4548609b953c

                    SHA512

                    7d36f6c400271344ac91e33cac6045b3642ba59b730dd21b678bb1b9de42619766f9739bff51423f8fb4a8304fecf61f13a14987b59b098ff99062bdc795eda4

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe

                    Filesize

                    1.5MB

                    MD5

                    9a994d678fb05bf73d7b61c76788f7eb

                    SHA1

                    3eb3769906efb6ff161555ebf04c78cb10d60501

                    SHA256

                    84ca892ab2410acef28721d58067fcba71f0de54ede62ef2fca9aeb845b5227f

                    SHA512

                    c7c846d6d8d2e43871c1c4471d26c6cfcee29a5b563eca69fef2f4e394767ef3e61a231626a1ff64aaf6a907d66a0cbe9db1c965128e3bab373e406ea891e6ce

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\RICHTX32.OCX

                    Filesize

                    207KB

                    MD5

                    045a16822822426c305ea7280270a3d6

                    SHA1

                    43075b6696bb2d2f298f263971d4d3e48aa4f561

                    SHA256

                    318cc48cbcfaba9592956e4298886823cc5f37626c770d6dadbcd224849680c5

                    SHA512

                    5a042ff0a05421fb01e0a95a8b62f3ce81f90330daed78f09c7d5d2abcb822a2fe99d00494c3ddd96226287fae51367e264b48b2831a8c080916ce18c0a675fa

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\SE_CLSEditorX.dll

                    Filesize

                    424KB

                    MD5

                    c2a51f02511eff6edf77bc99e50ad427

                    SHA1

                    a72700705c3fa64b5717ee30a4485b5299c7ac19

                    SHA256

                    dcfea0126e1c02aad0ea2fb6ef93d308fa20e67d4aa812487b4a5dc57e0ff16a

                    SHA512

                    1c7a0201e7b074f2dceba7e764eec261ecefd92a34741b4e152018aca41129ceb26d3a3cbe19ee7fc268820b1ff3b66e5b7e2523b076f45ad85b1d3cb11b12f0

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\Source.dat

                    Filesize

                    5.6MB

                    MD5

                    60147cda18bf6490afeeaa6635ea569c

                    SHA1

                    679d9c0923c71603c15a896d3485cbf26a289291

                    SHA256

                    7b668c5d6532b0e39afabc458426347c5e8f77566f608574e7d9c9a0dbccf290

                    SHA512

                    31465940d267af7e712372615837971903100702fa64a43edfe4a96a0988c685ccdaf8dee9e3a6bf5655ba5329040877da15fd4f3431dce34916d6fda9334a98

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\VBCCR15.OCX

                    Filesize

                    4.9MB

                    MD5

                    a00469043467b0ed571938679ab2e796

                    SHA1

                    68ae694ee41f86ee9240ac8abd516c668d3b907e

                    SHA256

                    83e48fb3b98f83c89a79d3d77698ae565a3f8ea09450d5a9dc5c4815d079e0fa

                    SHA512

                    e8986c0c100ee8edbab67febe0a4f6fa36d716fc2397fddd0df1b86a1eafb6d85ccab8f2f48c059fd0cc9aec1119caa5e4f6c387eb23bbc9aa876bf10a3218f3

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\ValueTransformers.dll

                    Filesize

                    2.9MB

                    MD5

                    473fe371f857c6bc57bcc6e879abdce0

                    SHA1

                    6c9bba7026bd56ff7e01213126e82b58b6b0ab04

                    SHA256

                    d13f8cafe9ae83284ff0bebaee9fa72515bf7bde2251f94879e3eac302483a5c

                    SHA512

                    7ea6c95c8d6ce86fe12d348d1ff2ce664d10f4e0288c430cf353de136de9df2ec40e0a7c6772d524be523110b86abf7cbb4ecbd719f06210104091d0448b51e7

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\comctl32.ocx

                    Filesize

                    1.3MB

                    MD5

                    2640ad05ab39321e6c9d3c71236ca0df

                    SHA1

                    03d30b572f312c2b554e76b3a18fbbb4a38a9be4

                    SHA256

                    634d27df20591de4d9b44dfb7f1ef03284c1d120f61b0801d668c1076d72cb6d

                    SHA512

                    7ea1357dcb7c22870c4993df30b00a79e61731cbea87775d800b7ff7f435858167780b22fd5af6a2df59edc1c5d5fb0e184c5f7ed4436c70ea5f91b8be4a1e75

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\jb2.ocx

                    Filesize

                    412KB

                    MD5

                    1396e7462eb8ce452b0f0e2540f2a0e6

                    SHA1

                    1a205c5a45e7fc0856db974605a1b01ad655b788

                    SHA256

                    83f5e5c8adc1ab0c701ec63a33e1ff3e114583116b04d31e3e6d6a37fb61defb

                    SHA512

                    2b00518d2e22d726aab3df67eaf468c49fca43d7ef2583092e04ad23b0f6085b4672fe9b1a6d80227461aafd97596e8fab176ef3f5ce2f94cda8bc3f9e6c5c04

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\settings.ini

                    Filesize

                    806B

                    MD5

                    2d707a1b8f827b5a7f54d5cfaa8e81c4

                    SHA1

                    684f00ae0cf04506ae48132d9f5eb6b913df74ea

                    SHA256

                    fac3409a96f95fd417f8525eba7c26486b1cc219b2fb257a9501c990743dea51

                    SHA512

                    5eb6a57d6e040da3990d5e88c741df25730f5cb17cbd7c20df1ae58f7af6659891efbea93ecec499b761824ddf0d8d357fb2b3063a1d08be5f5c5dfab43dbc8b

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\soundeffects\review.wav

                    Filesize

                    5.2MB

                    MD5

                    03f82642911d65bf9e055c1aef0468ef

                    SHA1

                    bfa726886ad082181b0bf8b8e99cfeb28c67c09b

                    SHA256

                    3c4e0d77225af8fe092d6d2ece9bfe916d99205999def1247fe4b6183224e5c8

                    SHA512

                    7fc17025892ec041ac90a728f07b7a922a5e24256e9f689afb5d799f1c8d65c3a45513dc695ade4727e409d61a687fc550bd9cdd5ecc0a485d6587e261f1f86c

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\tssOfficeMenu1d.ocx

                    Filesize

                    936KB

                    MD5

                    8f25663fc3d70f649cecf90fec0d5b4c

                    SHA1

                    7f77efb66aaf465c5b4a8ecc2bfe97ac5ba74801

                    SHA256

                    9ea2226c11465ca91fcda1761f3a9c0863ed47d33fc4c21df8084e59d9094e43

                    SHA512

                    38551de8779871471e4d7658cd100e2b6ffe522581463cee09a7743556e5ec8737c02db01dec001d57ffe573b75dd706f92a8750633232bb7ae0d4d169424aed

                  • C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\vcomp140.dll

                    Filesize

                    158KB

                    MD5

                    94950136ca0c9fde9d1dd02125420e42

                    SHA1

                    43ed4a5f1bf21202be48fae8244294824ea46815

                    SHA256

                    5474e4b5b012fa630adc969e049b35623ce8373e7d095ecfc8ba2f825350bab3

                    SHA512

                    6adbfe24b7e2c5596595ebf36843025b8305391154b8448cc738d358922f1d8175974120182b9fe9f3b6e190d2bc70569148466218f56e61ca8f3d49beded404

                  • C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe

                    Filesize

                    21.2MB

                    MD5

                    c3968e6090d03e52679657e1715ea39a

                    SHA1

                    2332b4bfd13b271c250a6b71f3c2a502e24d0b76

                    SHA256

                    4ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4

                    SHA512

                    f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a

                  • C:\Users\Admin\AppData\Local\Temp\1010242001\e0d67ba1a8.exe

                    Filesize

                    4.2MB

                    MD5

                    24733346a5bbfd60cd2afd7915b0ac44

                    SHA1

                    96b697c75295f2d5049c2d399d740c478c40c459

                    SHA256

                    f3b0734a5bf6ec2a77a02657e770842456f510980314765bef61ed367f4afc4d

                    SHA512

                    e0ad7c18eff4ee66c7857caea5091f6fefb5a7cd3c5bbaf6d47d54a73e4467700c232301e828f325ec76ed36fc1628d532fab9dceaae1704e444623a8bf69d35

                  • C:\Users\Admin\AppData\Local\Temp\1010243001\9139a13e73.exe

                    Filesize

                    1.9MB

                    MD5

                    52e5f6d44a86334dbb5c5c62036206e5

                    SHA1

                    b5a808378ac6433caea7197e879f58601050c8e8

                    SHA256

                    f60a518b29c845958c50ea1fb4d923362e8a6a8a8bcdb6e78610de9b6a8472b1

                    SHA512

                    f32e952db2f16f17fb3df4f413402a18bcf0f625c005d16ae8e4fa09bb5fc64ae4623ecb540cd1ac3acacd934e327091b5a480394e91d2444724099d1ae99c40

                  • C:\Users\Admin\AppData\Local\Temp\1010244001\6cef4e3b54.exe

                    Filesize

                    4.3MB

                    MD5

                    c00fb21ddc79c20f5c3b03aebdfcfee5

                    SHA1

                    352327cc87c1eb3c1fce7007892a7bfec519cd36

                    SHA256

                    1b112a298bb3c788d5400ea056c210281e03c8a936507b7642a34ec61b5cdcdd

                    SHA512

                    693064c47010edc5c8b44b81c784716de2203861aec76eeed0e0df9659fe4c74c2c19e91b5dee66e309f81ed0af97ec6458720c8d233b600b6fe96a9ebe7d966

                  • C:\Users\Admin\AppData\Local\Temp\1010245001\9464fff3b4.exe

                    Filesize

                    1.8MB

                    MD5

                    5637741a9347a75f030c8dca508dce77

                    SHA1

                    0085dd65c5a85d31134dc9f942c0db87c5c244d5

                    SHA256

                    f112dd6e062d55b329c69dbf48c72ace210abdff50e968a7aeb825d0e9c8321a

                    SHA512

                    b0b8dfb82bc6b15bb5a58fd7e3c749323779b88f0ed9d46cc924d98de3149d9af4d470cbd439807c2b01a79e5bbbe25449e63c1ad7409042896d6ebca0f88d7d

                  • C:\Users\Admin\AppData\Local\Temp\1010246001\5a589d757b.exe

                    Filesize

                    1.7MB

                    MD5

                    82d4640b5cb22596daafe345ddfcafc4

                    SHA1

                    2cdb2a0a9f6fdfb0c24e418136b4aeb3b2de0048

                    SHA256

                    acf37936b5d43a620c4e026e6408d17c4477cd428688de37f886385503e36d64

                    SHA512

                    c0b2657cc110d8d678c7f19729128987ef9c3e83c54d56d8be9d3960d1405860f935df7379ed1e97fa89c8d53ecbd85f7c5936956791a0c492aa615a02adfad7

                  • C:\Users\Admin\AppData\Local\Temp\1010247001\a25acc169a.exe

                    Filesize

                    901KB

                    MD5

                    5916bf407ecf55bfd9523d1725c2c13e

                    SHA1

                    02a9d308d5c53819f1c9ce7b255a689511bf1654

                    SHA256

                    118771259988d4c0d9a07014939dd644493fbc772bdf49a020aa6dd9f9242131

                    SHA512

                    7355e7d638a501f3f63547963022f2edb10b1d3442c7b449a63fd306cb082bae3bf2d2a64e14ad9e3aead6db1887450f883e263cd8f1d6aa799258de7548a773

                  • C:\Users\Admin\AppData\Local\Temp\1010248001\795613f5ee.exe

                    Filesize

                    2.7MB

                    MD5

                    9f96f3caa7f2a02688f8d8d3e2d2023a

                    SHA1

                    952d1b7f9b4d1c7e63d31138d381ea6a24addc6e

                    SHA256

                    0bf7ff82e557e4b5fa165bc29ba8bdba32511f8c1b466df6cfdbe6afd0882c67

                    SHA512

                    5e497dcbb631cc1b58a75feb31dcc3d681b0afb340552b1ff8ac53702aff0e844c997c5315c84400789483615032104ed4461db9917ffffb01b233e014085d6e

                  • C:\Users\Admin\AppData\Local\Temp\Orieqopofwqw

                    Filesize

                    40KB

                    MD5

                    ab893875d697a3145af5eed5309bee26

                    SHA1

                    c90116149196cbf74ffb453ecb3b12945372ebfa

                    SHA256

                    02b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba

                    SHA512

                    6b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc

                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    1.8MB

                    MD5

                    9127be998e556e17363396d1526611b4

                    SHA1

                    1183f9970e1774d3e157d70225c3b7f3c92d9699

                    SHA256

                    b852e881c1897d85e3ba7b89065c7ed027bcd775ec34e465b870fd5b2640b1ec

                    SHA512

                    20c571bfdcb0a0b844a2266e7cdcbc5b3e13b319ad22c8ef5cf9c4930c2caac6dd12cb027324d75161d2af90b88da3b4dc09eb13a1ec2392e343df0f7ac8fd4a

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                    Filesize

                    228B

                    MD5

                    719c2d69f90c30d6b39366c42153b8a6

                    SHA1

                    cfb51de58a60a339e87c81a7a70e051d7120c990

                    SHA256

                    b8f4c5654f7dacb031df816e4c42f5a9d3194bf892e82fd695939faeb856f4de

                    SHA512

                    535a6bce469d6fb633389c0bba1e50351328eae9122c3b9b09c98ddd8608d6fd15f3a66a5d192bf3fd5580acf26c17d198350b1b21dabeb4dd77afee40685708

                  • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                    Filesize

                    346B

                    MD5

                    b14f1dc20713e52839142fffd56f21b7

                    SHA1

                    efe7e76e6a835b46d7034d143c4fea5bfaf90d6d

                    SHA256

                    de160943cff9979e82bc2875627e5bb2647696f30f08fef878a7d778561134e8

                    SHA512

                    f51e2492cbe0150163670777a5d0ecbe755e17b8d4d05c55db288b68e19b8a5146483aa4a9ebf4922a9897599c261cf0c5c9e896bcede78f3e8bcec2bcbef2c0

                  • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                    Filesize

                    364B

                    MD5

                    c88e8818dde0a85db3df98d3809fd615

                    SHA1

                    d13dd2ade4666b20b20f557e8849c5367d40b455

                    SHA256

                    78cf40f38c501bec247cae219f76cbc458ef966040fafe42940bab4d27e6869b

                    SHA512

                    5d6f855bc1a32592b68cab680b8855be51efebb8712c9e73ceaba794e39f59166ab8826f8f44ce7e1fea20a1525f93c8491a959166254796883a5b6a54482104

                  • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                    Filesize

                    616B

                    MD5

                    d86aaa2d51b351ca4a66af3b3fb071e3

                    SHA1

                    0a8a80bde5bd322d93a6756f9b11a099a1ab2760

                    SHA256

                    fa0f0fec83962158215ba7958dd353896740ab48ea007ab43bd322d842be1851

                    SHA512

                    f866c34e039ee1c1a49456ae3de69a94f16ae6224f3db455d31c1ba637db42ed138dec7cc5bdaca3b4163000d19ff401eceb35e4a4cc762d9e924e8afc1f8b93

                  • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                    Filesize

                    640B

                    MD5

                    4d84afdb8fb2f52b7551726de00db96a

                    SHA1

                    93bc3dcf2d7bf600320c3616bb192a673689e573

                    SHA256

                    ef92755054e398ab8f2e2d6e559ce320ae508cd3a69550af6d4ef0edd2622c72

                    SHA512

                    d7b533d4a96d4d413df0e34c63f00269ed4185014a4c55ca278f0ef937651bec48573d3c416a60ff85633f6a0a3b34c6091dfe5338e7604b8632c63b53ed56f8

                  • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                    Filesize

                    934B

                    MD5

                    61a46c5eea049a9bccc1b2027310ef95

                    SHA1

                    93dceb2210a413e8190e2944c5dbce832e392221

                    SHA256

                    a8af33465eac2beb313b335be0edc0eabe93b0ed49686a0061bba2fe882cdb19

                    SHA512

                    1a8a681785864dc59656ed902971638bc9680b6988a9be4a9815eb016cdcbf73ee81c28fc6fd6b64df25d6ef36d76374ed0cf3d03c9a200b9268105b8ddc63bf

                  • C:\Users\Admin\AppData\Roaming\Jumping Bytes\PureSync\settings.psy

                    Filesize

                    1024B

                    MD5

                    455605adfbeeb92369f06f5926a48d10

                    SHA1

                    8294efb6d147932550b8888c6492db3791740387

                    SHA256

                    1d2f0e096e4e7f6e9bfcedf7629223b29824110a22b554547e822244663adef7

                    SHA512

                    a975d3f9cce44ae43b3cd03472f56a20a0fc173fe8ceb6f5f127272af56b3e50ed497c3c14feed05288dc95fae8b091714a1dae49fd96e46b879761309012177

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                    Filesize

                    6KB

                    MD5

                    87ac44ee38976b05823ed298288bed60

                    SHA1

                    59a647a26be12dcc30263419fd4bf08f5c74e25a

                    SHA256

                    86f78083791e6d4710afaca61a1078987e69c018e15c844924b7c3481b83a4b2

                    SHA512

                    946bc68516490b5b45a2730a6826010fafc75a72e493230cbbfaf2baf7ba24e76c0d46362e578991b7458e8e3753cc8f10aa61e129f0bc788371494ba588d4fa

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                    Filesize

                    8KB

                    MD5

                    42964599bb62ee62bc49a251c6817733

                    SHA1

                    30bc893d947aa297780edda09f3c6ead35e8d553

                    SHA256

                    c000295459c8fcffd107a1d9574ce3f5e1fe1cae5348eafe3fce614b5da712d1

                    SHA512

                    8ea6d573374bda326ba94501f5164ad232a544f3d5ec8d49ae490afdcdff9e2664c1f972fd3f065952a9baabade2fada65b0149aac19e78d62c88f23fd634c3f

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    5KB

                    MD5

                    6358f1b03037ae126f990c6e441cd41d

                    SHA1

                    494a5b2fb896473843169a774a33fda5f92f48cd

                    SHA256

                    11f5c1285995f6172fa3b994a70f119042cdf0d9fdcadbb68548ef801db221e2

                    SHA512

                    11df923c686da340723686cdc376d6e10973a552bd000a58822fc4c7f127f35e4f88ef60bf177a33c4ed241296333d9b5aae54d48dfba87d84a9ab1215ccbfd5

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    15KB

                    MD5

                    88f659fdd0c14851b96a28cfe525deab

                    SHA1

                    5ace311e73de1d9d944721694296b8e566f7eef4

                    SHA256

                    f260df054f1646b26cf074a767fcccf5c3912321a0ec7fbee2841f79f23130ea

                    SHA512

                    63da8acbd69f8da0e2dc29c2ea66e213475cbeaed08acfd77045d0e69382adc8da8e1911bd554f00f1d9c34054c8307032ce08ec637958c4b70d8ab46cbc7313

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\27625674-db2b-4fe0-bb45-00bb136fb9ac

                    Filesize

                    982B

                    MD5

                    fbb890e2203184e198e7c1a96519f23b

                    SHA1

                    580830916f06eab0ec792d45580bdea280b00b97

                    SHA256

                    5b8ae6b5d4071b274f9bf571832df55b6e4b2c00719a2d16861dd5674498696c

                    SHA512

                    e2c340ff5a0af6488ecc1d0c58b4f63cd1b484f6c58be14770c09bca21c0a30e9e9c53cb95bb5e55861badc0d9c6c14e3361bb8a82751493e44fc98d8b22d49f

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\70bcdbdd-ac14-44cb-88b2-c64420260b76

                    Filesize

                    671B

                    MD5

                    9b4f80760183e4aa7f964fc57b44bc97

                    SHA1

                    9732c3bcb2337ba59c5369b27a453bf15c6f147d

                    SHA256

                    6bb556f20f33a70d59cff53ade17128d83f2e3010310c9eca03b816025636ee8

                    SHA512

                    9a16cade787040e18364405e92c7f247613dfc10973ca0621bf43f6e3a90c4bb5a01e9d975121e56493c64a039bd97e6ab37e20c56c345d7358dcbdd654c50bc

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\9194f81b-ff1f-48e1-8bb3-643b86ca33c7

                    Filesize

                    26KB

                    MD5

                    1cdf0f5809cc7bca68cd352fc6809adf

                    SHA1

                    424bb22290cf584d4005203a3a8137c9c5ac26ce

                    SHA256

                    9756f8a82b7468f6c644dbd707dce97ddc1b2b8d91700da2877857f5dd6f1af3

                    SHA512

                    9f4f320abf367c5c70ff1e2717878d1f687bf066bd827f0bee97c9f3a1689759cb18f868da62aea0f3d0513ddaee8de41e3024a0dec0d92ae39c4bade965a3bb

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                    Filesize

                    15KB

                    MD5

                    09b3439176d11442bf0058cc460368db

                    SHA1

                    0f8c14b0e92956b52fb00accb62d0b52eae32a67

                    SHA256

                    bf600ea74bd461ea789b3019942b443f5fdcd17c28580500db817b51988b20d5

                    SHA512

                    78d6706c1eab7e71512302077e77fa910cf2ad11806a6ff7e31c358ef979b0e39bfe23a0927a068a088612ff690d280e721f5738a52548752d10224d54c8a063

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    da62f849b23b2455572826295c652ab2

                    SHA1

                    6cb212f55d5546e22e609e54d8173e9ac1a80f8f

                    SHA256

                    ff519ed6bb13a4e9a498f42a609f611a3dc6cef4bd47d5bb9e9eb467ba46d6a9

                    SHA512

                    4480d7015778290c6d7a8f602b925f51cd6746f3dc87325d698a3baddbdbbbdb01ed447899710c4591a18843892b9c4da3ffa5d26b6041baf8bd3b4264d164a3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                    Filesize

                    11KB

                    MD5

                    2d47884a600221417b9987b064f459a9

                    SHA1

                    692f1e1d5cde92435154fdc2c7bdd10251065410

                    SHA256

                    cf1dda68e367be3790d7276434ac1ebbc66eb59e957e123815ea7812dc54721c

                    SHA512

                    509423ec7977c1285a73ffe763c7e6b4f2c7442b82a1b7aa3a6691318b2240e026123690f0f990c22f17fd5b3e9ab4d08f6883e30f754fad331358ee7640b6c7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                    Filesize

                    10KB

                    MD5

                    ed0d00bd054fdcd93c5948cc6a3ad64e

                    SHA1

                    0d1b1b1238fdd824ae2e9e7ce089a89168d304ca

                    SHA256

                    6bba86b56e795ed755b19be8c451f99f21426bb607d8693a64140357526ea593

                    SHA512

                    a49d9c0c91b411c6ac91d253c352b08badef2f8a93164ff732593791f8b92f29b7a24467d8e9a9666f259d6965d9c5a7047b27f2bbbfa17aa0cb39bfbdb4e15a

                  • memory/640-580-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-16-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-192-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-43-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-2833-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-3496-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-3505-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-3507-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-80-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-124-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-3508-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-1328-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-19-0x0000000000A51000-0x0000000000A7F000-memory.dmp

                    Filesize

                    184KB

                  • memory/640-20-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-684-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-21-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-22-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-23-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-25-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/640-24-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/972-101-0x0000000000DB0000-0x0000000001A3C000-memory.dmp

                    Filesize

                    12.5MB

                  • memory/972-126-0x0000000000DB0000-0x0000000001A3C000-memory.dmp

                    Filesize

                    12.5MB

                  • memory/1292-77-0x0000000000DD0000-0x00000000019B6000-memory.dmp

                    Filesize

                    11.9MB

                  • memory/1292-59-0x0000000000DD0000-0x00000000019B6000-memory.dmp

                    Filesize

                    11.9MB

                  • memory/1656-586-0x0000000000ED0000-0x0000000001182000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1656-582-0x0000000000ED0000-0x0000000001182000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1656-203-0x0000000000ED0000-0x0000000001182000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1656-202-0x0000000000ED0000-0x0000000001182000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/1656-193-0x0000000000ED0000-0x0000000001182000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2136-3499-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/2224-144-0x0000000000A80000-0x0000000001120000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2224-142-0x0000000000A80000-0x0000000001120000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/3644-3-0x0000000000510000-0x00000000009C4000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3644-5-0x0000000000510000-0x00000000009C4000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3644-2-0x0000000000511000-0x000000000053F000-memory.dmp

                    Filesize

                    184KB

                  • memory/3644-0-0x0000000000510000-0x00000000009C4000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3644-1-0x0000000077EA4000-0x0000000077EA6000-memory.dmp

                    Filesize

                    8KB

                  • memory/3644-18-0x0000000000510000-0x00000000009C4000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3848-162-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/3848-168-0x0000000000A50000-0x0000000000F04000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4644-75-0x0000000000400000-0x00000000008A3000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4644-106-0x0000000000400000-0x00000000008A3000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4644-579-0x0000000000400000-0x00000000008A3000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4644-104-0x0000000000400000-0x00000000008A3000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4644-567-0x0000000000400000-0x00000000008A3000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4644-169-0x0000000000400000-0x00000000008A3000-memory.dmp

                    Filesize

                    4.6MB

                  • memory/4644-82-0x0000000010000000-0x000000001001C000-memory.dmp

                    Filesize

                    112KB

                  • memory/4780-121-0x00000000002A0000-0x0000000000757000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4780-172-0x00000000002A0000-0x0000000000757000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4780-583-0x00000000002A0000-0x0000000000757000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4780-568-0x00000000002A0000-0x0000000000757000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/4780-170-0x00000000002A0000-0x0000000000757000-memory.dmp

                    Filesize

                    4.7MB

                  • memory/6056-637-0x0000000003090000-0x000000000359A000-memory.dmp

                    Filesize

                    5.0MB

                  • memory/6056-644-0x00000000035D0000-0x000000000363D000-memory.dmp

                    Filesize

                    436KB

                  • memory/6056-643-0x00000000035D0000-0x000000000363D000-memory.dmp

                    Filesize

                    436KB

                  • memory/6056-648-0x0000000003640000-0x0000000003641000-memory.dmp

                    Filesize

                    4KB

                  • memory/6056-659-0x0000000072DC0000-0x0000000072E2E000-memory.dmp

                    Filesize

                    440KB

                  • memory/6056-662-0x00000000055C0000-0x0000000005719000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/6056-675-0x00000000055C0000-0x0000000005719000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/6056-3509-0x00000000055C0000-0x0000000005719000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/6056-3519-0x00000000055C0000-0x0000000005719000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/6056-3513-0x0000000009F90000-0x000000000A531000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-3515-0x00000000055C0000-0x0000000005719000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/6056-3514-0x00000000055C0000-0x0000000005719000-memory.dmp

                    Filesize

                    1.3MB

                  • memory/6056-3521-0x000000006E600000-0x000000006E69D000-memory.dmp

                    Filesize

                    628KB

                  • memory/6056-3522-0x000000000A7C0000-0x000000000AD61000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-3523-0x000000000A7C0000-0x000000000AD61000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-3520-0x0000000063280000-0x00000000634BE000-memory.dmp

                    Filesize

                    2.2MB

                  • memory/6056-3527-0x000000000A7C0000-0x000000000AD61000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-3528-0x000000000A7C0000-0x000000000AD61000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-3526-0x000000000A7C0000-0x000000000AD61000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-3525-0x000000000A7C0000-0x000000000AD61000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-3524-0x000000000A7C0000-0x000000000AD61000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/6056-677-0x00000000055C0000-0x0000000005719000-memory.dmp

                    Filesize

                    1.3MB